/netbsd-current/external/bsd/libpcap/dist/ |
H A D | pcap-sita.h | 9 extern int acn_parse_hosts_file(char *errbuf); 10 extern int acn_findalldevs(char *errbuf);
|
H A D | pcap-netmap.h | 2 int pcap_netmap_findalldevs(pcap_if_list_t *devlistp, char *errbuf);
|
H A D | pcap-dag.h | 14 int dag_findalldevs(pcap_if_list_t *devlistp, char *errbuf);
|
H A D | pcap-dbus.h | 4 int dbus_findalldevs(pcap_if_list_t *devlistp, char *errbuf);
|
H A D | pcap-snf.h | 4 int snf_findalldevs(pcap_if_list_t *devlistp, char *errbuf);
|
H A D | pcap-dpdk.h | 28 int pcap_dpdk_findalldevs(pcap_if_list_t *devlistp, char *errbuf);
|
H A D | pcap-septel.h | 15 int septel_findalldevs(pcap_if_list_t *devlistp, char *errbuf);
|
H A D | pcap-rpcap.h | 41 int read_timeout, struct pcap_rmtauth *auth, char *errbuf); 47 struct pcap_rmtauth *auth, pcap_if_t **alldevs, char *errbuf);
|
H A D | pcap-airpcap.h | 35 int airpcap_findalldevs(pcap_if_list_t *devlistp, char *errbuf);
|
H A D | sf-pcapng.h | 30 u_int precision, char *errbuf, int *err);
|
H A D | sf-pcap.h | 37 u_int precision, char *errbuf, int *err);
|
H A D | sockutils.h | 132 int sock_init(char *errbuf, int errbuflen); 135 void sock_vfmterrmsg(char *errbuf, size_t errbuflen, int errcode, 137 void sock_fmterrmsg(char *errbuf, size_t errbuflen, int errcode, 139 void sock_geterrmsg(char *errbuf, size_t errbuflen, 143 char *errbuf, int errbuflen); 145 char *errbuf, int errbuflen); 147 char *errbuf, int errbuflen); 148 SOCKET sock_open(const char *host, struct addrinfo *addrinfo, int server, int nconn, char *errbuf, int errbuflen); 149 int sock_close(SOCKET sock, char *errbuf, int errbuflen); 152 char *errbuf, in [all...] |
H A D | sslutils.h | 47 int ssl_init_once(int is_server, int enable_compression, char *errbuf, size_t errbuflen); 48 SSL *ssl_promotion(int is_server, SOCKET s, char *errbuf, size_t errbuflen); 50 int ssl_send(SSL *, char const *buffer, int size, char *errbuf, size_t errbuflen); 51 int ssl_recv(SSL *, char *buffer, int size, char *errbuf, size_t errbuflen);
|
H A D | sslutils.c | 62 int ssl_init_once(int is_server, int enable_compression, char *errbuf, size_t errbuflen) argument 78 snprintf(errbuf, errbuflen, "Cannot get a new SSL context: %s", ERR_error_string(ERR_get_error(), NULL)); 89 snprintf(errbuf, errbuflen, "Cannot read certificate file %s: %s", certfile, ERR_error_string(ERR_get_error(), NULL)); 96 snprintf(errbuf, errbuflen, "Cannot read private key file %s: %s", keyfile, ERR_error_string(ERR_get_error(), NULL)); 106 snprintf(errbuf, errbuflen, "Cannot read CA list from %s", ssl_rootfile); 119 snprintf(errbuf, errbuflen, "Cannot init random"); 136 SSL *ssl_promotion(int is_server, SOCKET s, char *errbuf, size_t errbuflen) argument 138 if (ssl_init_once(is_server, 1, errbuf, errbuflen) < 0) { 147 snprintf(errbuf, errbuflen, "SSL_accept(): %s", 153 snprintf(errbuf, errbufle 183 ssl_send(SSL *ssl, char const *buffer, int size, char *errbuf, size_t errbuflen) argument 211 ssl_recv(SSL *ssl, char *buffer, int size, char *errbuf, size_t errbuflen) argument [all...] |
H A D | pcap-new.c | 75 int pcap_findalldevs_ex(const char *source, struct pcap_rmtauth *auth, pcap_if_t **alldevs, char *errbuf) argument 92 snprintf(errbuf, PCAP_ERRBUF_SIZE, "The source string is too long. Cannot handle it correctly."); 105 if (pcap_parsesrcstr(source, &type, NULL, NULL, NULL, errbuf) == -1) 111 if (pcap_parsesrcstr(source, &type, NULL, NULL, NULL, errbuf) == -1) 118 if (pcap_findalldevs(alldevs, errbuf) == -1) 123 snprintf(errbuf, PCAP_ERRBUF_SIZE, 137 if (pcap_createsrcstr(tmpstring, PCAP_SRC_IFLOCAL, NULL, NULL, dev->name, errbuf) == -1) 147 pcap_fmt_errmsg_for_errno(errbuf, 165 pcap_fmt_errmsg_for_errno(errbuf, 191 if (pcap_parsesrcstr(source, &type, NULL, NULL, name, errbuf) 382 pcap_open(const char *source, int snaplen, int flags, int read_timeout, struct pcap_rmtauth *auth, char *errbuf) argument [all...] |
H A D | savefile.c | 114 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, 132 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, 141 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, 149 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, 157 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, 165 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, 173 (void)snprintf(pcap->errbuf, sizeof(pcap->errbuf), 182 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, 191 snprintf(p->errbuf, PCAP_ERRBUF_SIZ 354 pcap_open_offline_with_tstamp_precision(const char *fname, u_int precision, char *errbuf) argument 408 pcap_open_offline(const char *fname, char *errbuf) argument 415 pcap_hopen_offline_with_tstamp_precision(intptr_t osfd, u_int precision, char *errbuf) argument 442 pcap_hopen_offline(intptr_t osfd, char *errbuf) argument 487 pcap_fopen_offline_with_tstamp_precision(FILE *fp, u_int precision, char *errbuf) argument 621 pcap_fopen_offline(FILE *fp, char *errbuf) argument [all...] |
H A D | pcap-null.c | 45 pcap_platform_finddevs(pcap_if_list_t *devlistp _U_, char *errbuf _U_) 56 bpf_u_int32 *maskp _U_, char *errbuf) 58 (void)pcap_strlcpy(errbuf, nosup, PCAP_ERRBUF_SIZE); 55 pcap_lookupnet(const char *device _U_, bpf_u_int32 *netp _U_, bpf_u_int32 *maskp _U_, char *errbuf) argument
|
H A D | sockutils.c | 159 void sock_vfmterrmsg(char *errbuf, size_t errbuflen, int errcode, argument 162 if (errbuf == NULL) 166 pcap_vfmt_errmsg_for_win32_err(errbuf, errbuflen, errcode, 169 pcap_vfmt_errmsg_for_errno(errbuf, errbuflen, errcode, 174 void sock_fmterrmsg(char *errbuf, size_t errbuflen, int errcode, argument 180 sock_vfmterrmsg(errbuf, errbuflen, errcode, fmt, ap); 187 void sock_geterrmsg(char *errbuf, size_t errbuflen, const char *fmt, ...) argument 192 sock_vfmterrmsg(errbuf, errbuflen, sock_geterrcode(), fmt, ap); 314 * \param errbuf: a pointer to an user-allocated buffer that will contain 323 * error message is returned in the buffer pointed to by 'errbuf' variabl 326 sock_init(char *errbuf, int errbuflen) argument 435 sock_create_socket(struct addrinfo *addrinfo, char *errbuf, int errbuflen) argument 504 sock_open(const char *host, struct addrinfo *addrinfo, int server, int nconn, char *errbuf, int errbuflen) argument 875 sock_close(SOCKET sock, char *errbuf, int errbuflen) argument 910 get_gai_errstring(char *errbuf, int errbuflen, const char *prefix, int err, const char *hostname, const char *portname) argument 1083 sock_initaddress(const char *host, const char *port, struct addrinfo *hints, struct addrinfo **addrinfo, char *errbuf, int errbuflen) argument 1209 sock_send(SOCKET sock, SSL *ssl _U_NOSSL_, const char *buffer, size_t size, char *errbuf, int errbuflen) argument 1350 sock_bufferize(const void *data, int size, char *outbuf, int *offset, int totsize, int checkonly, char *errbuf, int errbuflen) argument 1413 sock_recv(SOCKET sock, SSL *ssl _U_NOSSL_, void *buffer, size_t size, int flags, char *errbuf, int errbuflen) argument 1520 sock_recv_dgram(SOCKET sock, SSL *ssl _U_NOSSL_, void *buffer, size_t size, char *errbuf, int errbuflen) argument 1668 sock_discard(SOCKET sock, SSL *ssl, int size, char *errbuf, int errbuflen) argument 1731 sock_check_hostlist(char *hostlist, const char *sep, struct sockaddr_storage *from, char *errbuf, int errbuflen) argument 1926 sock_getmyinfo(SOCKET sock, char *address, int addrlen, char *port, int portlen, int flags, char *errbuf, int errbuflen) argument 1992 sock_getascii_addrport(const struct sockaddr_storage *sockaddr, char *address, int addrlen, char *port, int portlen, int flags, char *errbuf, size_t errbuflen) argument 2083 sock_present2network(const char *address, struct sockaddr_storage *sockaddr, int addr_family, char *errbuf, int errbuflen) argument [all...] |
H A D | pcap-rpcap-int.h | 49 * Best practice is to define the errbuf variable as a char of size 'PCAP_ERRBUF_SIZE+1' 73 int rpcap_senderror(SOCKET sock, char *error, unsigned short errcode, char *errbuf);
|
H A D | pcap-tc.h | 52 TcFindAllDevs(pcap_if_list_t *devlistp, char *errbuf);
|
/netbsd-current/lib/libutil/ |
H A D | ttymsg.c | 66 static char errbuf[1024]; local 80 (void)snprintf(errbuf, sizeof(errbuf), 82 return errbuf; 86 (void)snprintf(errbuf, sizeof(errbuf), 89 return errbuf; 95 (void)snprintf(errbuf, sizeof(errbuf), 97 return errbuf; [all...] |
/netbsd-current/external/bsd/libpcap/dist/rpcapd/ |
H A D | rpcapd.c | 187 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local 199 // Initialize errbuf 200 memset(errbuf, 0, sizeof(errbuf)); 336 if (pcap_init(PCAP_CHAR_ENC_UTF_8, errbuf) == -1) 338 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); 343 if (sock_init(errbuf, PCAP_ERRBUF_SIZE) == -1) 345 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); 364 sock_geterrmsg(errbuf, PCAP_ERRBUF_SIZE, 366 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); 558 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local 735 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local 857 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local 1136 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local 1330 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local [all...] |
H A D | daemon.c | 130 static int daemon_AuthUserPwd(char *username, char *password, char *errbuf); 145 static int daemon_unpackapplyfilter(SOCKET sockctrl, SSL *, struct session *session, uint32 *plenp, char *errbuf); 221 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local 249 *errbuf = 0; // Initialize errbuf 264 SOCK_EOF_ISNT_ERROR|SOCK_MSG_PEEK, errbuf, PCAP_ERRBUF_SIZE); 268 rpcapd_log(LOGPRIO_ERROR, "Peek from client failed: %s", errbuf); 329 "TLS is required by this server", errbuf) == -1) 332 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); 339 ssl = ssl_promotion(1, sockctrl, errbuf, PCAP_ERRBUF_SIZ 1143 char errbuf[PCAP_ERRBUF_SIZE]; local 1222 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local 1421 daemon_AuthUserPwd(char *username, char *password, char *errbuf) argument 1606 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local 1857 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local 1960 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local 2297 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local 2420 char errbuf[PCAP_ERRBUF_SIZE]; local 2474 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local 2534 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local 2606 char errbuf[PCAP_ERRBUF_SIZE + 1]; // error buffer local 2914 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local 2946 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local 2974 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local [all...] |
/netbsd-current/external/bsd/tre/dist/lib/ |
H A D | regerror.c | 54 tre_regerror(int errcode, const regex_t *preg, char *errbuf, size_t errbuf_size) argument 68 if (errbuf_size > 0 && errbuf != NULL) 72 strncpy(errbuf, err, errbuf_size - 1); 73 errbuf[errbuf_size - 1] = '\0'; 77 strcpy(errbuf, err);
|
/netbsd-current/external/gpl2/grep/dist/lib/ |
H A D | error.c | 171 char errbuf[1024]; local 173 fprintf (stderr, ": %s", __strerror_r (errnum, errbuf, sizeof errbuf)); 177 __strerror_r (errnum, errbuf, sizeof errbuf); 178 fprintf (stderr, ": %s", errbuf); 254 char errbuf[1024]; 256 fprintf (stderr, ": %s", __strerror_r (errnum, errbuf, sizeof errbuf)); 260 __strerror_r (errnum, errbuf, sizeo 253 char errbuf[1024]; local [all...] |